| Version | |
|---|---|
| tracy-client.0.6 (latest) | |
| tracy-client.0.5.2 | |
| tracy-client.0.5.1 | |
| tracy-client.0.5 | |
| tracy-client.0.4 | |
| tracy-client.0.3 | |
| tracy-client.0.2 | |
| tracy-client.0.1 |
| Product | For package | Vendor | Severity | CVE | Published |
|---|---|---|---|---|---|
| linux-headers | tracy-client.0.3 | n/a | High | CVE-2023-1670 | 3/30/2023 |
| linux-headers | tracy-client.0.6 | n/a | High | CVE-2023-1670 | 3/30/2023 |
| linux-headers | tracy-client.0.5.1 | n/a | High | CVE-2023-1670 | 3/30/2023 |
| linux-headers | tracy-client.0.5.2 | n/a | High | CVE-2023-1670 | 3/30/2023 |
| linux-headers | tracy-client.0.5.1 | n/a | High | CVE-2023-1652 | 3/29/2023 |
| linux-headers | tracy-client.0.4 | n/a | High | CVE-2023-1652 | 3/29/2023 |
| linux-headers | tracy-client.0.5 | n/a | High | CVE-2023-1652 | 3/29/2023 |
| linux-headers | tracy-client.0.6 | n/a | High | CVE-2023-1652 | 3/29/2023 |
| linux-headers | tracy-client.0.3 | n/a | High | CVE-2023-1652 | 3/29/2023 |
| linux-headers | tracy-client.0.2 | n/a | High | CVE-2023-1652 | 3/29/2023 |
| linux-headers | tracy-client.0.1 | n/a | High | CVE-2023-1652 | 3/29/2023 |
| linux-headers | tracy-client.0.5.2 | n/a | High | CVE-2023-1652 | 3/29/2023 |
| linux-headers | tracy-client.0.5.1 | n/a | Medium | CVE-2023-1637 | 3/27/2023 |
| linux-headers | tracy-client.0.4 | n/a | Medium | CVE-2023-1637 | 3/27/2023 |
| linux-headers | tracy-client.0.5.2 | n/a | Medium | CVE-2023-1637 | 3/27/2023 |
| linux-headers | tracy-client.0.5 | n/a | Medium | CVE-2023-1637 | 3/27/2023 |
| linux-headers | tracy-client.0.6 | n/a | Medium | CVE-2023-1637 | 3/27/2023 |
| linux-headers | tracy-client.0.2 | n/a | Medium | CVE-2023-1637 | 3/27/2023 |
| linux-headers | tracy-client.0.3 | n/a | Medium | CVE-2023-1637 | 3/27/2023 |
| linux-headers | tracy-client.0.1 | n/a | Medium | CVE-2023-1637 | 3/27/2023 |